55 posts categorized "Cloud Security"

12 June 2017

Name: Haruhiko Kurita Title: Senior Security Consultant Employer: NetOne Systems Location: Tokyo, Japan Degree: Master of Science, Physics Years in IT: 24 Years in cybersecurity: 21 Cybersecurity certifications: CISSP, CCSP, CISA, PCI DSS QSA How did you decide upon a career in cybersecurity? My career in cybersecurity started around 1995, when the internet was becoming popular here in Japan. My first product was HSM (Hardware Security Module) and I was interested in cryptography, as technology was very attractive to me. After three mergers, the company (Tandem) became bigger and I covered various parts of security, like F/W, antivirus, identity management,...
Read more →

24 May 2017

Name: Frederico Hakamine Title: Principal Curriculum Developer Employer: Okta Inc. Location: San Francisco, CA, U.S.A. Degree: Bachelor in System Analysis Years in IT: 10 years Years in cybersecurity: 9 years Cybersecurity certifications: CISSP, CCSP, ISFS, ITIL, CobIT, Oracle Certified Architecture Specialist, Okta Certified Professional How did you decide upon a career in cybersecurity? I started working for Oracle as consultant 10 years ago, with a challenge: develop a portal with independent web applications, that should require a single login and display restricted information depending on where you were located (intranet or internet). Developing the application was a straightforward task. The...
Read more →

21 April 2017

Name: Guy Bertrand Kamga Title: Senior Security Analyst Employer: Nokia Location: Paris, France Degree: Master in Computer Science Engineering Years in IT: 14 Years in cybersecurity: 7 Cybersecurity certifications: CISSP, CCSK, CCSP How did you decide upon a career in cybersecurity? I decided to focus in cybersecurity when I realized that due to the rapid development of new technologies (e.g. social networks, cloud) and the proliferation of mobile devices, it will be more and more challenging to efficiently protect personal data and other sensitive information. Why did you get your CCSP®? I decided to take the CCSP exam to challenge...
Read more →

30 March 2017

Name: Chris Sellards Title: Senior Security Architect Employer: Harland Clarke Holdings Location: San Antonio, Texas Degree: Master of Science, Information Security. Currently pursuing a Doctor of Science in Cybersecurity at Capitol Technology University Years in IT: 21 Years in cybersecurity: 17 Cybersecurity certifications: CISSP-ISSAP, CCSP, CAP, CCSK, CEH, CHFI, GCWN, NSA IAM, NSA IEM, Tripwire Enterprise Administration How did you decide upon a career in cybersecurity? Even before officially being employed in the IT field, I was fascinated with security. I ran my first blog in the mid-1990s where I covered various security topics. I worked as an engineer for...
Read more →

21 March 2017

Name: Tim Weil Title: Network Project Manager Employer: Alcohol Monitoring Systems Location: Denver, Colorado, U.S.A. Degree: BA in Sociology/Latin American Studies from Immaculate Heart College, MS in Computer Science from Johns Hopkins University Years in IT: 30+ Years in cybersecurity: 15+ Cybersecurity certifications: CCSP, CISSP, CISA, CRISC How did you decide upon a career in cybersecurity? Working in the telecommunications industry through the dot-com era, my core networking skills became less valuable when I obtained the CISSP in 2003. In the federal sector, I worked as a contractor for more than 10 years for more than 10 agencies, specializing in...
Read more →

21 February 2017

Name: Leon Kolthof Title: Information Security Officer Employer: Centric Netherlands B.V. Location: Breda Area, Netherlands Degree: Bachelor in Business IT & Management Years in IT: 9 Years in cybersecurity: 6 Cybersecurity certifications: CCSP, CISSP-ISSAP, CISSP-ISSMP, CISM, CCSK, CEH How did you decide upon a career in cybersecurity? My IT career started in the field of system/network engineering. From this field of practice, I developed my professionalism toward information security. Through formal education, hands-on experience, and my own interest in the field, I have extended my knowledge in this dynamic discipline. Continuously building your knowledge and being keen on self-improvement is...
Read more →

10 February 2017

This year’s (ISC)² Security Congress – with the theme “Leaders of Tomorrow” – will take place September 25-27 in Austin, Texas at the JW Marriott. For the first time, Security Congress will be a stand-alone event, without former partner ASIS International. “We value the partnership we had with ASIS International for the past six years, but it was time for Security Congress to stand on its own to address the programming needs expressed by our members,” says (ISC)² CEO David Shearer. The cybersecurity conference will host more than 90 educational sessions, as well as a town hall meeting, career center...
Read more →

06 February 2017

Name: Olayinka Ladeji Job Title: Management Consultant, Information & Cybersecurity and IT Advisory Employer: Enaxis Consulting Location: Houston, Texas, U.S.A. Degree: Bachelor’s degree in Electrical and Electronics Engineering Years in IT: 14 Years in cybersecurity: 12 Cybersecurity certifications: CCSP, CISSP, CISM, CBCP How did you decide upon a career in cybersecurity? Information security has always been my passion. I was working at a financial organization after college, but didn’t get the opportunity to work in the field of information security until an independent information security department was set up there shortly after I joined. I was drafted into the department,...
Read more →

23 January 2017

Name: Nanditha Rao Title: Information Systems Security Principal Employer: CSRA, LLC Degree: Master of Science in Computer Science Years in IT: 14 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP How did you decide upon a career in cybersecurity? I found myself in the field due to the encouragement from my supervisors who believed that I had the analytical skills to move from IT risk management to IT security and cybersecurity. It was a natural transition for me, and I really enjoyed working in the domain. Since my start in the security field, I have actively worked to learn new...
Read more →

03 January 2017

Name: Mahbubul Islam Title: Head of Secure Design Employer: U.K. Government Department Degree: B.Sc., M.Sc. Years in IT: 15 Years in cybersecurity: 10 Cybersecurity certifications: CCSP, CISM, SABSA, LCCP, ISO27001 LA How did you decide upon a career in cybersecurity? I started working for the U.K. government in 2001 and whilst working on various standard projects, I was successful in landing an apprentice role as an Information Assurance Manager. The role was very flexible, as it was the first of its kind which allowed myself and my colleagues to determine a structured plan to develop security skills within the fields...
Read more →

30 December 2016

Name: Ceri Charlton Title: Group Information Security Manager Employer: Atradius Degree: M.Sc (Distinction) in Information Security and Computer Crime, 1st Class B.Sc., with Honours, in Computer Studies Years in IT: 14 Years in cybersecurity: 11 Cybersecurity certifications: CCSP, CISSP, Former QSA and PA-QSA, PCIP, Ethical Ninja (Grade 1) How did you decide upon a career in cybersecurity? When I first went into computing, I wanted to work on all aspects – and cybersecurity lets me remain involved in all areas. I also love how fast-paced and varied the field is, as you are always learning. I also foresaw, fairly accurately,...
Read more →

27 December 2016

Adrian Davis, Managing Director, EMEA at (ISC)² explains how we can stop the ongoing proliferation of vulnerabilities in connected cars It’s clear that we are rapidly moving towards turning cars into rolling internet browsers, connecting to everything from traffic lights to household appliances. Future vehicles will get remote updates on traffic jams or weather, automatically alert emergency services to accidents as they happen, allow drivers to get over-the-air ‘upgrades’ without visiting a dealership and even warm up their kettles from their cars. Software updates can now give cars self-driving features, turn them into rolling Wi-Fi hotspots or even allow them...
Read more →

28 November 2016

Name: Ayman Ouda Title: Senior Consultant / Senior Architect Employer: Telstra / Avirna Education: Bachelor’s in Telecommunications Engineering, Master’s in Information Technology Years in IT: 17+ Years in cybersecurity: 4 Cybersecurity certifications: CCSP and CCSK How did you decide upon a career in cybersecurity? I decided upon a career in cybersecurity as a normal progression of being a cloud consultant. Working as a cloud architect for the last seven-eight years, I discovered nearly all of our clients express the same two concerns, which are: “How secure is the cloud?” and “If we decide to move, what is the exit strategy?”...
Read more →

23 November 2016

Internal compliance and control – the key elements of self-governance – are falling woefully behind the times thanks to traditions that have not yet received a full overhaul. This is bad news for business in the private and public sectors, since the enemies they face have already stepped up to the speed of "now." According to Shrikant Deshpande, senior banking technology, risk and assurance professional and (ISC)² Certified Cloud Security Professional (CCSP®), there seems to be a gap between Internal Audit, GRC (Governance, risk management, and compliance) and Cybersecurity in terms of formalized methods of defining risks, monitoring and assurance....
Read more →

08 November 2016

Name: Kevin L. Jackson Title: Founder/CEO Employer: GovCloud Network, LLC Degree: B.S. Aerospace Engineering, M.S. Computer Engineering, M.A. National Strategic Studies Years in IT: 25+ Years in cybersecurity: 5 Cybersecurity certifications: CCSP How did you decide upon a career in cybersecurity? The rapid rise in the adoption of cloud computing by business indicates that cloud is rapidly becoming critical to the nation’s economic stability. With this, cybersecurity in the cloud will essentially be synonymous with national security. As an IT professional and intelligence community professional, it seemed like a natural path. Why did you get your CCSP®? Although cybersecurity was...
Read more →

28 October 2016

Name: Abel Sussman Title: Practice Director, Public Services Employer: Coalfire Degree: B.S. Computer Science, State University of New York at Binghamton, MBA, State University of New York at Albany Years in IT: 20 Years in cybersecurity: 15 Cybersecurity certifications: CISSP, CCSP How did you decide upon a career in cybersecurity? I not only wanted to grow my career, but also desired to find a way to give back to the country. My move into cybersecurity as a federal auditor provides the opportunity to assure our nation’s critical infrastructure and assets are secure and protected. My entrance into cybersecurity started with...
Read more →

24 October 2016

A view from the Conference Chair, Dr. Adrian Davis, CISSP, Managing Director (EMEA) (ISC)² From an examination of how augmented humans will live, work and play, to policy commitments from the Irish government, (ISC)²’s Third Annual Congress EMEA delegates gained a comprehensive view of the changing world to be faced by cybersecurity professionals. The international community of 250 members and information security professionals started to gather the evening before the event for our member reception and Town Hall Q&A. These events presented a well appreciated opportunity to hear from four serving members of our Board of Directors from outside the...
Read more →

20 October 2016

Name: Tim Strong Title: Manager, Security Operational Governance Practice Employer: National Australia Bank Degree: B.Sc. Computing, Psychology Years in IT: 20+ Years in cybersecurity: 15 Cybersecurity certifications: CCSP, CISSP, C|EH, ComptTIA Security+ How did you decide upon a career in cybersecurity? I always found the most interesting bits of my early career were related to Security. I would actively seek out projects with a Security component, and after a few years I realized that I was excited and passionate about Securing (and breaking into!) computer systems. So about 15 years ago I chose to move into Security as a specialization....
Read more →

18 October 2016

A recent DDoS attack on a well-known industry journalist heralds a new age in cyber warfare, mainly because the bots involved originated not from other computers, but from devices attached to the Internet of Things (IoT). This has security experts concerned, and some of our own CCSPs weigh in with their thoughts here.
Read more →

30 September 2016

Ransomware has grown recently to become a significant threat to companies, governments and institutions worldwide. The reasons for its growth are not only due to technology – they can also be found in human activity and even the strategies and day-to-day operations of business. Steve Prentice with Cloud Tweaks recently interviewed some Certified Cloud Security Professionals (CCSPs) to get their take on how serious ransomware is, and how preventable it can be. He found there is much that can be done on the inside to keep these attacks from being wholly destructive to merely annoying. To learn more, read his...
Read more →

About the (ISC)² Blog

As the certifying body for more than 125,000 cyber, information, software and infrastructure security professionals worldwide, (ISC)² believes in the importance of open dialogue and collaboration. (ISC)² established this blog to provide a voice to certified members, who have significant knowledge and valuable insights that can benefit other security professionals and the public at large.

The (ISC)² blog gives members a forum to exchange ideas and inspires a safe and secure cyber world by supporting the advancement of the information security workforce via a public exchange with a broad range of information security topics.

Whether an (ISC)² member chooses to participate in the (ISC)² blog is his or her own decision. The postings on this site are the author's own and don't necessarily represent (ISC)²'s positions, strategies or opinions. (ISC)² monitors the blog in accordance with the (ISC)² Blog Guidelines, but the bloggers are responsible for their own content – common sense and intelligence should prevail.

Other than links to the (ISC)² website, (ISC)² does not control or endorse any links to products or services provided in this blog and makes no warranty regarding the content on any other linked website.

Those who post comments to (ISC)² blogs should ensure their comments are focused on relevant topics that relate to the specific blog being discussed. (ISC)² reserves the right to remove any post or comment from this site. Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org